In multiple functions of ShortcutService.java, there is a possible creation of a spoofed shortcut due to a missing permission check. This could lead to local escalation of privilege in a privileged app with no additional execution privileges needed. User interaction is needed for exploitation.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/2018-09-01 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Dec 2024, 17:11
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 | |
First Time |
Google android
|
|
CPE | cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:* cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:* |
|
References | () https://source.android.com/security/bulletin/2018-09-01 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Information
Published : 2024-11-20 17:15
Updated : 2024-12-18 17:11
NVD link : CVE-2018-9469
Mitre link : CVE-2018-9469
CVE.ORG link : CVE-2018-9469
JSON object : View
Products Affected
- android